You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
Written by the co-managers of the Kermit Project, this is a revised and updated tutorial on data communications, with new material on today's high-speed modems and how to make the best use of them
None
In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.
As technology continues to evolve, the popularity of mobile computing has become inherent within today’s society. With the majority of the population using some form of mobile device, it has become increasingly important to develop more efficient cloud platforms. Modern Software Engineering Methodologies for Mobile and Cloud Environments investigates emergent trends and research on innovative software platforms in mobile and cloud computing. Featuring state-of-the-art software engineering methods, as well as new techniques being utilized in the field, this book is a pivotal reference source for professionals, researchers, practitioners, and students interested in mobile and cloud environments.
This book investigates the sustained engagement between American literature and sound recording technologies during the twentieth century.
If you have ever looked at a fantastic adventure or science fiction movie, or an amazingly complex and rich computer game, or a TV commercial where cars or gas pumps or biscuits behaved liked people and wondered, “How do they do that?”, then you’ve experienced the magic of 3D worlds generated by a computer. 3D in computers began as a way to represent automotive designs and illustrate the construction of molecules. 3D graphics use evolved to visualizations of simulated data and artistic representations of imaginary worlds. In order to overcome the processing limitations of the computer, graphics had to exploit the characteristics of the eye and brain, and develop visual tricks to simula...
Dive into the electrifying tale of a Brooklyn-born patriot turned radical activist, in an era when America was torn by its ideological extremes. In the shadow of recent turmoil, Join the Conspiracy transports readers to a pivotal moment of division and dissent in American history: the late 1960s. Against the backdrop of the Vietnam War and a nation grappling with internal conflict, this compelling narrative follows the life of George Demmerle, a factory worker whose political odyssey encapsulates the era's tumultuous spirit. From his roots as a concerned citizen wary of his country's leftward tilt, Demmerle's journey takes a dramatic turn as he delves into the heart of radical activism. Part...
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.